peridot/peridot/cmd/v1/peridot/utils.go

127 lines
4.2 KiB
Go

// Copyright (c) All respective contributors to the Peridot Project. All rights reserved.
// Copyright (c) 2021-2022 Rocky Enterprise Software Foundation, Inc. All rights reserved.
// Copyright (c) 2021-2022 Ctrl IQ, Inc. All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are met:
//
// 1. Redistributions of source code must retain the above copyright notice,
// this list of conditions and the following disclaimer.
//
// 2. Redistributions in binary form must reproduce the above copyright notice,
// this list of conditions and the following disclaimer in the documentation
// and/or other materials provided with the distribution.
//
// 3. Neither the name of the copyright holder nor the names of its contributors
// may be used to endorse or promote products derived from this software without
// specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
// ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
// CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
// CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
// POSSIBILITY OF SUCH DAMAGE.
package main
import (
"context"
"crypto/tls"
"fmt"
"golang.org/x/oauth2"
"golang.org/x/oauth2/clientcredentials"
"log"
"net/http"
"openapi.peridot.resf.org/peridotopenapi"
)
type service string
const (
serviceProject = service("project")
serviceImport = service("import")
servicePackage = service("package")
serviceBuild = service("build")
serviceTask = service("task")
)
var (
doNotUseDirectlyClient map[service]interface{}
doNotUseDirectlyCtx context.Context
)
func getClient(svc service) interface{} {
if doNotUseDirectlyClient != nil {
return doNotUseDirectlyClient[svc]
}
doNotUseDirectlyClient = make(map[service]interface{})
tlsConfig := &tls.Config{
// We should allow users to configure this.
InsecureSkipVerify: skipCaVerify(), //nolint:gosec
}
apiCfg := &peridotopenapi.Configuration{
Debug: debug(),
Host: endpoint(),
Scheme: "https",
UserAgent: "peridot/0.1",
HTTPClient: &http.Client{
Transport: &http.Transport{
TLSClientConfig: tlsConfig,
},
},
DefaultHeader: map[string]string{},
Servers: peridotopenapi.ServerConfigurations{
{
URL: "https://" + endpoint(),
},
},
OperationServers: map[string]peridotopenapi.ServerConfigurations{},
}
apiClient := peridotopenapi.NewAPIClient(apiCfg)
doNotUseDirectlyClient[serviceProject] = apiClient.ProjectServiceApi
doNotUseDirectlyClient[serviceImport] = apiClient.ImportServiceApi
doNotUseDirectlyClient[servicePackage] = apiClient.PackageServiceApi
doNotUseDirectlyClient[serviceBuild] = apiClient.BuildServiceApi
doNotUseDirectlyClient[serviceTask] = apiClient.TaskServiceApi
return doNotUseDirectlyClient[svc]
}
func getContext() context.Context {
if doNotUseDirectlyCtx == nil {
doNotUseDirectlyCtx = context.TODO()
oauth2Config := &clientcredentials.Config{
ClientID: getClientId(),
ClientSecret: getClientSecret(),
// We don't currently support scopes, but authorize based on SpiceDB.
// Lack of scopes does not indicate that client has full access, but
// that we're managing access server sides and scopes doesn't affect that.
Scopes: []string{},
TokenURL: fmt.Sprintf("https://%s/oauth2/token", hdrEndpoint()),
AuthStyle: oauth2.AuthStyleInHeader,
}
tokenSource := oauth2Config.TokenSource(doNotUseDirectlyCtx)
doNotUseDirectlyCtx = context.WithValue(doNotUseDirectlyCtx, peridotopenapi.ContextOAuth2, tokenSource)
}
return doNotUseDirectlyCtx
}
func errFatal(err error) {
if err != nil {
log.Fatalf("an error occurred: %s", err.Error())
}
}